Stop Chasing Ghosts: Prioritize Real Risks in the AI Era

We are living in the Age of AI, where the way we build software has fundamentally changed. With the rise of AI-assisted coding tools like Cursor, GitHub Copilot and Claude Code, developers are generating code faster than ever before. Recent industry reports indicate that AI-generated code now accounts for nearly 46% of new code written, significantly accelerating development cycles [1].

However, rapid code generation has outpaced remediation. Teams are flying blind, with 68% of organizations leaving critical vulnerabilities unresolved for over 24 hours, often due to a lack of context (37%) [2]. When SREs cannot determine if a vulnerable library is running or reachable, every alert becomes a fire drill, leading to paralysis rather than action.

This context gap generates massive toil that drags down engineering velocity. With security teams spending up to 50% of their time on manual tasks, friction rolls downhill to SREs in the form of endless Jira tickets and emergency patches [2]. 59% report that these siloed practices create inefficiencies [2] meaning you get woken up for vulnerabilities that aren't even exploitable in your environment. To break this cycle, engineering must shift to real-time insights, focusing on the code actively exposing you to risk right now.

We're excited to announce that Secure Application in Splunk Observability Cloud is generally available now! Built to extend the industry-leading Splunk Observability Cloud into the realm of application security, it provides the runtime visibility so you need to defend against these rapid threats and enhance compliance.

Security Built on Your Existing Observability Solution

Splunk Observability Cloud is already a leader in Application Performance Monitoring (APM), trusted by teams to unify application, infrastructure, and digital experience monitoring in one place. You rely on it to detect and investigate issues using all your metric, trace, and log data—with zero sampling and AI-assisted troubleshooting.

Secure Application builds directly on these core strengths. It collects additional security-specific events alongside your existing telemetry, enriching the massive stream of full-fidelity data you are already collecting. By analyzing the traces that tell you why an application is slow, we can now map open-source risk directly to your business impact, telling you if and where you are vulnerable. This convergence makes your observability platform stronger, turning operational data into security intelligence.

Transform Your Security Posture

Here is how unifying your existing observability with application security transforms your security posture:

1. Minimal Friction Security with Deep Application Context

Splunk Observability Cloud empowers you to control your data and costs using OpenTelemetry (OTel). Secure Application doubles down on this advantage by delivering runtime vulnerability detection mapped directly to your application context—all with minimal friction.

Image 1: Detect Runtime Vulnerability with Application and Risk Context using existing OpenTelemetry Agents

2. Simplified Library Discovery in a Complex World

With AI generating code and pulling in dependencies at record speed, maintaining an accurate Software Bill of Materials (SBOM) is a constant battle. Modern applications are often a "black box" of transitive dependencies—libraries that your libraries rely on.

Image 2: Detect Runtime Open-Source Libraries with Application Context

3. Data-Driven Prioritization with Cisco Vulnerability Management

Engineering teams are often trapped in a cycle of "SLA fatigue." Static scanners frequently flag hundreds of vulnerabilities as "Critical” and “High” based solely on their Common Vulnerabilities Scoring System (CVSS) score. This creates an impossible math problem: if you have 500 critical alerts and 24 hours to a week SLA to patch them, your team spends all their time patching instead of building.

The solution: risk-based prioritization. To break this cycle, you need to shift from fixing everything to fixing what matters. This requires distinguishing between a vulnerability that could be exploited and one that is being exploited. Splunk Secure Application integrates Cisco Vulnerability Management (CVM) to provide this intelligence. CVM analyzes billions of signals—from active exploit kits to dark web chatter—to predict the real-world likelihood of an attack.

Consider two vulnerabilities, both flagged with a High CVSS score of 7.5 as shown below:

Instead of rushing to patch both within a 24-hour SLA, your team can prioritize Vulnerability CVE-2024-38819 immediately and safely schedule Vulnerability CVE-2025-41249 for a later sprint. This ensures you meet compliance for actual threats while reducing unnecessary fire drills.

Image 3: Prioritize Runtime Vulnerabilities based on Risk of Exploitation to enhance SLA Compliance

4. Mapping Risk to Business Impact

A vulnerability in a rarely used backend service is different from one in your business-critical application checkout flow. Because Secure Application is integrated into Splunk Observability Cloud, it understands your application's architecture, user journeys, and business context.

Image 4: Prioritize Runtime Vulnerabilities based on Business Context

5. Extending Insights to Splunk Cloud and Enterprise

Runtime insights shouldn't stay siloed in the observability platform. Secure Application allows you to leverage the investments your organization already has in Splunk Cloud or Splunk Enterprise.

Summary: Engineering Confidence in the Age of AI

In the age of AI, engineering teams face a dual mandate: accelerate business outcomes and maintain rock-solid reliability. Splunk Secure Application bridges the gap between dev speed and production safety. By leveraging the minimal friction of OpenTelemetry, deep inventory visibility, Cisco’s predictive risk scoring, business impact mapping, and seamless integration with the Splunk platform, you can stop chasing ghosts. It’s time to move beyond noise, prioritizing the threats that truly matter to keep your runtime secure and your innovation engine moving fast.

Join Us at Cisco Live Amsterdam!

We are showcasing the future of application security live. To see a deep dive into how Splunk and Cisco are revolutionizing runtime protection, join our breakout session:

Ready to Secure Your Runtime?

Empower your teams to fix faster and ship safer.

References

  1. GitHub (2023). " GitHub Copilot now has a better AI model and new capabilities."
  2. BusinessWire (2025). "Report Finds 68% of Organizations Fail to Remediate Critical Vulnerabilities on Time."

Related Articles

Visualising a Space of JA3 Signatures With Splunk
Security
2 Minute Read

Visualising a Space of JA3 Signatures With Splunk

One common misconception about machine learning methodologies is that they can completely remove the need for humans to understand the data they are working with. In reality, it can often place a greater burden on an analyst or engineer to ensure that their data meets the requirements, cleanliness and standardization assumed by the methodologies used. However, when the complexity of the data becomes significant, how is a human supposed to keep up? One methodology is to use ML to find ways to keep a human in the loop!
Using the Lookup Command for Threat Hunting (Lookup Before You Go-Go)
Security
4 Minute Read

Using the Lookup Command for Threat Hunting (Lookup Before You Go-Go)

Lookup commands are basically the #1 place to start any threat hunt in Splunk. Get the expert directions here.
Detecting Google Cloud Platform OAuth Token Abuse Using Splunk
Security
5 Minute Read

Detecting Google Cloud Platform OAuth Token Abuse Using Splunk

Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.